Analysis
-
max time kernel
101s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:30
Static task
static1
Behavioral task
behavioral1
Sample
85d09cb470fac72a4baee36133c895a74f7e9adad0e7a16527cf6606705a66a0.exe
Resource
win7-20240903-en
General
-
Target
85d09cb470fac72a4baee36133c895a74f7e9adad0e7a16527cf6606705a66a0.exe
-
Size
798KB
-
MD5
721d3421f9a2e8077117df38e86841fb
-
SHA1
37eeb6d7ac92f609b3828838f484ce4ed6b8fd38
-
SHA256
85d09cb470fac72a4baee36133c895a74f7e9adad0e7a16527cf6606705a66a0
-
SHA512
5544a6b5ff7c7a71356ca4be24b18f6fe4d909b4090a041dbc9a0f8028196a2b1b30b1a9680702f65f659b3d50e4422513a468adf232f91c8451d4408c216608
-
SSDEEP
24576:ZbrlINJAclYSKU9rvGwfDLYgvFx5taMx+:ZXlINJNlYdelLxT5tb+
Malware Config
Extracted
xloader
2.5
heay
filosofgangen.com
clickb4shop.com
diesva.online
gcs-eu.com
gznk.net
connectmatchsupport.com
sunrisetillsunuptow.com
44.plus
hhhsccultum.quest
mindful.support
academyofpeerservices.net
acemilados.xyz
xn--belle-mre-63a.com
investigatoridaho.com
haimalvpai.com
mstlons.com
arxom.xyz
kcckurla.com
undeclined.info
3881a.com
mygiopveguiolcusonline.com
galleryfurniture.store
trangtritrannha.com
autowallet168.com
classification-metallurgie.com
cheapfareindia.com
alpacacamping.net
tsm-discount-products.xyz
snack-tips.com
fritzconcrete.com
eve-media.store
cxjxwx.com
palisadestahoeski.com
authorsadielove.com
bittyblogger.com
ahlinxiang.com
imips.net
tierraenllamas.com
shsbzm.com
var1nmewq58.xyz
ceuniv-comalcalco.com
motelesguadalajara.online
adnildesign.com
hl8mkt.com
geohashes.com
finsith.com
clinicasandraromero.com
davidknudtson.com
rivercityskatingacademy.com
dream-kingdom.com
tramsq.com
360mediasolution.com
nhentayi.net
naturaldecayfabrication.com
alibiaglet.pro
brandmogul.club
bigcountrysbeefjerky.com
wlqfcy.com
789betvietnam.club
istilllmail.com
cryptoscopy.direct
xkdrb.com
neighborscience.com
classvharts.com
earlystartmanagement.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/1048-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4720 set thread context of 1048 4720 85d09cb470fac72a4baee36133c895a74f7e9adad0e7a16527cf6606705a66a0.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85d09cb470fac72a4baee36133c895a74f7e9adad0e7a16527cf6606705a66a0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1048 85d09cb470fac72a4baee36133c895a74f7e9adad0e7a16527cf6606705a66a0.exe 1048 85d09cb470fac72a4baee36133c895a74f7e9adad0e7a16527cf6606705a66a0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4720 wrote to memory of 1048 4720 85d09cb470fac72a4baee36133c895a74f7e9adad0e7a16527cf6606705a66a0.exe 93 PID 4720 wrote to memory of 1048 4720 85d09cb470fac72a4baee36133c895a74f7e9adad0e7a16527cf6606705a66a0.exe 93 PID 4720 wrote to memory of 1048 4720 85d09cb470fac72a4baee36133c895a74f7e9adad0e7a16527cf6606705a66a0.exe 93 PID 4720 wrote to memory of 1048 4720 85d09cb470fac72a4baee36133c895a74f7e9adad0e7a16527cf6606705a66a0.exe 93 PID 4720 wrote to memory of 1048 4720 85d09cb470fac72a4baee36133c895a74f7e9adad0e7a16527cf6606705a66a0.exe 93 PID 4720 wrote to memory of 1048 4720 85d09cb470fac72a4baee36133c895a74f7e9adad0e7a16527cf6606705a66a0.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\85d09cb470fac72a4baee36133c895a74f7e9adad0e7a16527cf6606705a66a0.exe"C:\Users\Admin\AppData\Local\Temp\85d09cb470fac72a4baee36133c895a74f7e9adad0e7a16527cf6606705a66a0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\85d09cb470fac72a4baee36133c895a74f7e9adad0e7a16527cf6606705a66a0.exe"C:\Users\Admin\AppData\Local\Temp\85d09cb470fac72a4baee36133c895a74f7e9adad0e7a16527cf6606705a66a0.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1048
-